DAMAGE ANALYSIS OF DEGRADED SLITTING KNIFE
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 9
Abstract
This study analyzed the damage to a slitting knife after cutting steel sheets. Damages to the structure were observed and wear tests were conducted. In addition, the degradation on the damaged and undamaged parts was compared with a Vickers hardness test. Weibull statistical analysis was carried out in order to evaluate the reliability of the Vickers hardness measured data. Spalling of the edge portion occurred by degradation during use over a long period. Rough parts in the specimens were caused by damage because the slitting knife was used for 1 year. The friction coefficient and wear loss at the damaged parts of the knife edge were slightly larger from shock due to repetitive cutting operation. The Vickers hardness followed a two-parameter Weibull probability distribution.
Authors and Affiliations
Ki-Woo Nam
To Estimate the Cooling Load of a Desire Space with help of C Programming
Cooling load of a desire space is the rate of heat which must be removed from the space to maintain at a specific space air temperature and moisture content. This work provides a procedure for preparing calculatio...
Efficient Implementation of 64-Point FFT/IFFT for OFDM on FPGA
the available spectrum into many carriers. OFDM uses the spectrum efficiently compared to FDMA. With the rapid growth of digital wireless communication in recent years, the need for high-speed mobile data transm...
A SURVEY ON MINING UNCERTAIN FREQUENT ITEM SET EFFECTIVELY USING PATTERN GROWTH APPROACH
The Frequent Itemset Mining (FIM) is well-known problem in data mining. The FIM is very useful for business intellisense, weather forecasting etc. Many frequent pattern mining algorithms find patterns from traditional...
Cloud Storage Security And Providing Integrity Proof
Cloud computing has been envisioned as the next-generation architecture and solution to the rising storage costs of IT Enterprises. Cloud faithfully stores the data and return back to the owner whenever needed. Bu...
Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL
Advanced Encryption Standard (AES), has received significant interest over the past decade due to its performance and security level. In most of the previous works subbytes and inverse subbytes are implemented in Separ...